Files
flake/lib/mksystem.nix
2025-11-05 11:08:11 +01:00

138 lines
5.1 KiB
Nix

{
nixpkgs,
overlays,
...
} @ inputs: hostname: {
env,
user ? "zoriya",
system ? "x86_64-linux",
wsl ? false,
darwin ? false,
avf ? false,
custom ? [],
customHome ? [],
}: let
systemFunc =
if darwin
then inputs.nix-darwin.lib.darwinSystem
else nixpkgs.lib.nixosSystem;
home-manager =
if darwin
then inputs.home-manager.darwinModules
else inputs.home-manager.nixosModules;
cli =
if darwin
then ../modules/cli/darwin.nix
else ../modules/cli;
specialArgs = inputs // {inherit user;};
in
systemFunc {
inherit system specialArgs;
modules =
[
overlays
cli
(../environments + "/${env}")
({pkgs, ...}: {
networking.hostName = hostname;
users.users.${user} = {
home =
if darwin
then "/Users/${user}"
else "/home/${user}";
shell = pkgs.zsh;
openssh.authorizedKeys.keys = [
"ssh-rsa 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 zoriya@fuhen" # laptop
"ssh-rsa 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 zoriya@nixos" # lucca windows
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIB/TujCSbUueF4p3wbzImPkEvgJjshDfh2sb/bwGdaRN" # bitwarden
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBzfKjYeQ80s/M+qEKCxBhseJjLa2OwBk9ZrHeku90Vg zoriya@kujima" # android
"ssh-rsa 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 zroux@zroux-mac" # lucca mac
];
};
})
../hosts/${hostname}/hardware-configuration.nix
home-manager.home-manager
{
home-manager = {
useGlobalPkgs = true;
useUserPackages = true;
extraSpecialArgs = specialArgs;
users.${user} = {
imports =
[
../modules/cli/home.nix
(../environments + "/${env}/home.nix")
]
++ customHome;
};
};
}
]
++ nixpkgs.lib.optionals (!darwin)
[
inputs.nix-index-database.nixosModules.nix-index
{
users.users.root.hashedPassword = builtins.readFile ../password/root;
users.users.${user} = {
isNormalUser = true;
hashedPassword = builtins.readFile ../password/${user};
extraGroups = [
"wheel"
"input"
"docker"
"audio"
"mlocate"
"libvirtd"
"networkmanager"
];
};
networking.nameservers = ["1.1.1.1" "9.9.9.9"];
networking.resolvconf.extraConfig = "name_servers=\"1.1.1.1 9.9.9.9\"";
}
]
++ nixpkgs.lib.optionals wsl [
inputs.nixos-wsl.nixosModules.wsl
({pkgs, ...}: {
wsl.enable = true;
wsl.defaultUser = user;
environment.systemPackages = with pkgs; [
wslu
wsl-open
];
services.flatpak.enable = true;
xdg.portal = {
enable = true;
wlr.enable = true;
config.common.default = "*";
};
})
]
++ nixpkgs.lib.optionals avf [
inputs.nixos-avf.nixosModules.avf
{
avf.defaultUser = user;
}
]
++ nixpkgs.lib.optionals darwin [
inputs.nix-index-database.darwinModules.nix-index
({pkgs, ...}: {
environment.systemPackages = with pkgs; [
coreutils
];
# auth sudo via fingerprint
security.pam.services.sudo_local = {
reattach = true;
touchIdAuth = true;
};
})
]
++ custom;
}